Control: AWS > CIS v2.0 > 4 - Monitoring > 4.11 - Ensure Network Access Control Lists (NACL) changes are monitored
Configures auditing against a CIS Benchmark item.
Level: 2
Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs, or an external Security information and event management (SIEM) environment, and establishing corresponding metric filters and alarms. NACLs are used as a stateless packet filter to control ingress and egress traffic for subnets within a VPC. It is recommended that a metric filter and alarm be established for changes made to NACLs.
Resource Types
This control targets the following resource types:
Primary Policies
The following policies can be used to configure this control:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-cisv2-0#/control/types/r0411
- tmod:@turbot/cis#/control/categories/v071103
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-cisv2-0#/control/types/r0411"
Get Controls
Control Type URI
Category URI
GraphQL
CLI